IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time
- 1 January 2010
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- EXEPublished by Association for Computing Machinery (ACM) ,2006
- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C ProgramsLecture Notes in Computer Science, 2006
- CUTEPublished by Association for Computing Machinery (ACM) ,2005
- DARTPublished by Association for Computing Machinery (ACM) ,2005
- ARCHERR: Runtime Environment Driven Program SafetyLecture Notes in Computer Science, 2004
- The rising threat of vulnerabilities due to integer errorsIEEE Security & Privacy, 2003
- Flow-sensitive type qualifiersPublished by Association for Computing Machinery (ACM) ,2002
- A theory of type qualifiersPublished by Association for Computing Machinery (ACM) ,1999
- Efficiently computing static single assignment form and the control dependence graphACM Transactions on Programming Languages and Systems, 1991